JanusGraph: A small glimpse into the big world of graphs
Read below to learn from Florian Hockmann of G Data how JanusGraph compares with Neo4j, why you should be keeping an eye out for TinkerPop 4, and get expert tips on graph data modeling.
JanusGraph: A small glimpse into the big world of graphs
Read below to learn from Florian Hockmann of G Data how JanusGraph compares with Neo4j, why you should be keeping an eye out for TinkerPop 4, and get expert tips on graph data modeling.
Interview with Carl-Benedikt Bender “Machine learning in general is very complex and has a lot of surprises in store”
With its DeepRay AI technology, G DATA is leading the way against rapidly changing malware. Carl-Benedikt Bender, leader of the development team behind DeepRay, explains how the technology works and what specific challenges arose during development.
Malware Naming Hell Part 1: Taming the mess of AV detection names
Everyone who deals with malware will know this: Malware names are a convoluted mess. AV scanners will show different detection names for the same file. This confusion is also reflected in media coverage. Is there a way out of this mess?
Strange Bits: Sodinokibi Spam, CinaRAT, and Fake G DATA
In the second part of our Strange Bits series we are taking a closer look at Sodinokibi Spam E-Mails, CinaRAT and a Malware that tries to imitate G DATA.
Distributing Malware - one "Word" at a Time
Using Microsoft Word to distribute malware is a common tactic used by criminals. Given the popularity of Word, criminals can often "live off the land" and use mechanisms that are already in place to do their dirty work.
Group chats: Apple's Facetime turns iPhone into a bug
A security flaw in Apple's Facetime can turn the iPhone into an eavesdropping device. It will transmit a live feed from the device's camera and microphone to the eavesdropper. The affected feature has been cut off for now.
Emotet: G DATA explains cybercrime's all-purpose weapon
No other malware-family is as penetrating and has been in development as long as Emotet. The malware has already caused millions in damage in companies around the world. We explain what Emotet can do and why it is so dangerous.
Predictions 2019: "The era of simple Android malware is over"
Whether on smartphones, desktop computers, crypto currencies or websites - IT security is becoming increasingly important for end-users. We give an outlook on the most important trends for the year 2019.
Captchas are dead...ish.
According to a recently published research paper, some types of Captchas are now obsolete. The reason: machines have learned to solve those Captchas.
Security tip for this holiday season: Uninstall Flash
During the holiday season, users can do themselves a big favor by ditching Adobe Flash, a software notorious for its frequent security flaws. The reason: A zero-day-exploit, which has been spotted at Hacking Team.